Chapter 9 Device Network Settings
Vantage CNM User’s Guide
265
9.2.2 WLAN Add/Edit: WEP Security
WEP provides a mechanism for encrypting data using encryption keys. Both the
ZyWALL and the wireless stations must use the same WEP key to encrypt and
decrypt data. Your ZyWALL allows you to configure up to four 64-bit or 128-bit
WEP keys, but only one key can be used at any one time.
Note: WEP is extremely insecure. Its encryption can be broken by an attacker, using
widely-available software. It is strongly recommended that you use a more
effective security mechanism. Use the strongest security mechanism that all the
wireless devices in your network support. For example, use WPA-PSK or
WPA2-PSK or WPA or WPA2 if your wireless devices support it. If your wireless
devices support nothing stronger than WEP, use the highest encryption level
available.
To configure and enable WEP encryption, click the Add (or Edit) icon next to a
wireless interface in the Device Operation > Device Configuration > Network
> Interface > WLAN > General to open the WLAN Edit screen. Select WEP as
the Security Type. The following screen shows the WEP security fields.
Figure 110
Device Operation > Device Configuration > Network > Interface > WLAN
> General > Add (WEP Security)
OK
Click OK to save your changes back to the ZyWALL.
Cancel
Click Cancel to exit this screen without saving.
Table 101
Network > Interface > WLAN > Add (No Security) (continued)
LABEL
DESCRIPTION
Summary of Contents for VANTAGE CNM
Page 2: ......
Page 20: ...New Template User s Guide 20...
Page 23: ...23 PART I Introduction Introducing Vantage CNM 21 GUI Introduction 25...
Page 24: ...24...
Page 46: ...46...
Page 50: ...Chapter 3 Load or Save Building Blocks BB Vantage CNM User s Guide 50...
Page 140: ...Chapter 6 Device Security Settings Vantage CNM User s Guide 140 IKE Gateway Policy Add Edit...
Page 242: ...Chapter 8 Device Log Vantage CNM User s Guide 242...
Page 246: ...246...
Page 346: ...Chapter 11 IPSec VPN Vantage CNM User s Guide 346...
Page 356: ...Chapter 13 L2TP VPN Vantage CNM User s Guide 356...
Page 384: ...Chapter 14 Vantage CNM User s Guide 384...
Page 408: ...408...
Page 456: ...Chapter 18 Firmware Management Vantage CNM User s Guide 456...
Page 474: ...474...
Page 494: ...494...
Page 534: ...Chapter 26 Device Alarm Vantage CNM User s Guide 534...
Page 535: ...535 PART VII Log Report Device Operation Report 537 CNM Logs 553 VRPT 555...
Page 536: ...536...
Page 552: ...Chapter 27 Device Operation Report Vantage CNM User s Guide 552...
Page 560: ...560...
Page 580: ...Chapter 30 CNM System Setting Vantage CNM User s Guide 580...
Page 588: ...Chapter 33 Vantage CNM Software Upgrade Vantage CNM User s Guide 588...
Page 592: ...Chapter 35 About CNM Vantage CNM User s Guide 592...
Page 593: ...593 PART IX Account Management User Group 595 Account 599...
Page 594: ...594...
Page 598: ...Chapter 36 User Group Vantage CNM User s Guide 598...
Page 603: ...603 PART X Troubleshooting Troubleshooting 605...
Page 604: ...604...
Page 610: ...610...
Page 616: ...Appendix A Product Specifications Vantage CNM User s Guide 616...
Page 634: ...Appendix B Setting up Your Computer s IP Address Vantage CNM User s Guide 634...
Page 656: ...Appendix E IP Address Assignment Conflicts Vantage CNM User s Guide 656...
Page 666: ...Appendix G Importing Certificates Vantage CNM User s Guide 666...